Data Breach at Panasonic

Data Breach at Panasonic

The Panasonic Corporation has disclosed a data security incident in which an undisclosed amount of data was compromised. In a statement issued Friday, the major Japanese multinational conglomerate announced that an unauthorized third party had gained access to its network on November 11.  An internal investigation was launched that determined that the intruder had accessed some data stored on a file server. Panasonic did not say how much data was compromised in the incident or whether any sensitive information…

Read More

IT Teams Dealing with Great Expectations and Stress

IT Teams Dealing with Great Expectations and Stress

At some companies, it seems as though IT teams have transformed from company scapegoat to company G.O.A.T. (greatest of all time). Amidst a momentous digital transformation, IT teams were essential in easing the massive business disruptions of 2020 and 2021 by enabling a massive shift to remote work and rapid upswing in digital commerce. With anticipation that 2022 will be a more stable year than the previous two, it’s a good time to examine the…

Read More

McAfee Enterprise Defender Blog | Windows Zero-Day – CVE-2021-41379

McAfee Enterprise Defender Blog | Windows Zero-Day – CVE-2021-41379

Threat Summary This month it was disclosed that a Microsoft vulnerability that allows for local privilege elevation, previously patched in the November 2021 Patch Tuesday, is still exploitable and was not patched correctly. Using this vulnerability, threat actors with limited access to a compromised device can easily elevate their privileges to help spread laterally within the network. Figure 1. MITRE ATT&CK Matrix for Windows Zero-Day in MVISION Insights The vulnerability affects all supported versions of…

Read More

CISA Seeks Extra Email Protection

CISA Seeks Extra Email Protection

The United States’ Cybersecurity and Infrastructure Security Agency (CISA) is exploring a protective email service (PES) that can be used to make Federal Civilian Executive Branch (FCEB) email safer.  In October 2017, the Department of Homeland Security took action against the spoofing of domains and organizations by mandating DMARC or domain-based message authentication, reporting and conformance standards by all federal agencies in its Binding Operational Directive 18-01.  Now, CISA is asking the cybersecurity industry for feedback…

Read More

Now Live! New Partner Roles Mean More Customer Value – Cisco Blogs

Now Live! New Partner Roles Mean More Customer Value – Cisco Blogs

Since we launched our Cisco Partner Program last year, the integrator and provider roles went live with great momentum. Now, I’m happy to share with you that the developer and advisor roles are open for business. Developers and advisors are important because they design and produce solutions that deliver more advanced capabilities based on Cisco technology to customers. The Cisco Partner Program We are going live with a running start and gaining speed. With developers,…

Read More

Clearlake Capital to Acquire Quest Software

Clearlake Capital to Acquire Quest Software

Private equity firm Clearlake Capital Group LP has agreed to acquire Californian tech company Quest Software from its current owner, Francisco Partners.  The terms of the planned transaction have not been disclosed. However, Quest has been valued at $5.4bn, including debt, according to unnamed sources quoted by The Wall Street Journal. A statement announcing the acquisition was released earlier today. It revealed that current CEO of Quest, Patrick Nichols, will remain at the helm after the acquisition has been completed to lead the existing executive…

Read More

SmartNICs set to infiltrate enterprise networks

SmartNICs set to infiltrate enterprise networks

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components–the smartNIC or data processing unit (DPU). Use of smartNICs in the enterprise is still evolvinging, but the idea behind them–offloading server CPU duties onto a separate device to free up server cycles–is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in…

Read More

SmartNICs set to infiltrate enterprise network, security worlds

SmartNICs set to infiltrate enterprise networks

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components–the smartNIC or data processing unit (DPU). Use of smartNICs in the enterprise is still evolvinging, but the idea behind them–offloading server CPU duties onto a separate device to free up server cycles–is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in…

Read More

The Power of BOLD: Innovative Partnerships – Cisco Blogs

The Power of BOLD: Innovative Partnerships – Cisco Blogs

Co-authored by: Alex Pujols, Director of Systems Engineering, Cisco  Our Partners make everything possible, especially when it comes to innovation. This past year, our conversations with our partner community have been focused on how we can innovate in many areas, from evolving routes to market to the important role of developers to cross-architecture opportunities. We need bold innovation. From Cisco’s Global Systems Engineering teams to our Emerging Technologies & Incubation team, we are putting our collective expertise…

Read More

WFH security: How to protect your remote endpoints from vulnerabilities

WFH security: How to protect your remote endpoints from vulnerabilities

Many organizations lack an effective patch management program, especially when it comes to patching remote systems, says Action1. Image: iStock/ cyano66 Patch management is one of the trickiest but most essential tasks you can take to protect your software, systems and other assets. Cybercriminals know that organizations often fail to properly or quickly patch known vulnerabilities, leaving this a key vector for attack. Patching security holes has become even more difficult with the advent of…

Read More
1 3,168 3,169 3,170 3,171 3,172 3,816